Dark Reading Staff, Dark Reading

March 28, 2024

1 Min Read
Indian flag with a bunch of green binary code on top of it
Source: ADragan via Shutterstock

India's government agencies and energy companies are facing a new threat in the form of an espionage campaign using an open source information stealer.

"HackBrowersData," a modified information stealer, can collect user login credentials, cookies, and browser history, according to researchers at EclecticIQ, a Dutch cybersecurity firm. The researchers discovered the information stealer through a phishing email disguised as an invitation from the Indian Air Force. 

According to the researchers, the threat actor used Slack channels to upload the stolen internal documents, emails, and browser data after the information stealer was executed. Each of the Slack channels the threat actor used was named "FlightNight," leading the researchers to dub the intrusion "Operation FlightNight."

Indian government entities responsible for IT governance, national defense, and electronic communications have been targeted. The bad actors also went after financial documents, personal identifiable information (PII), and oil and gas drilling data of the energy companies.

"In total, the actor exfiltrated 8.81 GB of data, leading analysts to assess with medium confidence that the data could aid further intrusions into the Indian government's infrastructure," the researchers wrote in a blog post.

EclecticIQ has since shared its research with Indian authorities to help support victims of these attacks.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights